Static task
static1
Behavioral task
behavioral1
Sample
3714ad52f2ae4143a9ce40b47a9d1dc6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3714ad52f2ae4143a9ce40b47a9d1dc6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3714ad52f2ae4143a9ce40b47a9d1dc6_JaffaCakes118
-
Size
172KB
-
MD5
3714ad52f2ae4143a9ce40b47a9d1dc6
-
SHA1
2bd25a04c278f08b8d5a1bc180aa360ad0d5e311
-
SHA256
c41561c280e417f698b9481ae4db577a24c7f7c6d6bbf28b32d00a57160a6270
-
SHA512
477274aee4dbb1fb3417980a8efbbcc63d91c9c52f7c2c5528f2942586e7376c44a5334d8c7758867ce4be29714db0e5dfde923a55bdb7a258b59750d2f906dd
-
SSDEEP
3072:9P9v4CpwqtzR0ZQ6vmE7OOcBe9Xh7+YHdqK6gPk:9Vv4Cpws+Q6+E7rKNlK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3714ad52f2ae4143a9ce40b47a9d1dc6_JaffaCakes118
Files
-
3714ad52f2ae4143a9ce40b47a9d1dc6_JaffaCakes118.exe windows:4 windows x86 arch:x86
90194adaff577d771cc7c7119103fa85
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FlushFileBuffers
CreateFileA
SetErrorMode
InitializeCriticalSection
lstrlenW
InterlockedExchange
LockResource
SetEvent
FindClose
CompareStringA
GlobalFree
FreeEnvironmentStringsA
WaitForSingleObjectEx
GetLocalTime
GlobalLock
ReadFileEx
CreateEventA
SetEndOfFile
FormatMessageW
CreateFileW
SetStdHandle
CloseHandle
LoadResource
CreateEventW
CompareStringW
GetFileSize
GetFileAttributesW
ReleaseMutex
HeapDestroy
SetEnvironmentVariableA
InterlockedExchangeAdd
SleepEx
GlobalAlloc
ReadFile
SetFilePointerEx
GlobalUnlock
ResetEvent
lstrlenA
GetVersionExA
DeleteFileW
WaitForMultipleObjectsEx
GetThreadLocale
GetSystemTime
DeleteFileA
FormatMessageA
GetSystemInfo
RaiseException
TryEnterCriticalSection
GetModuleFileNameW
WriteFileEx
FindCloseChangeNotification
GetStartupInfoA
GetFileAttributesA
SetFilePointer
CreateThread
SizeofResource
LocalFree
FreeLibrary
InterlockedCompareExchange
GetFileSizeEx
RegisterWaitForSingleObject
LocalAlloc
GetModuleHandleA
WaitForSingleObject
VirtualAlloc
user32
SetMenuItemBitmaps
GetWindowWord
SetWindowPos
LoadStringA
SetMenuItemInfoW
DefWindowProcA
RegisterClassA
DestroyIcon
SendMessageA
ShowWindowAsync
GetCursorPos
LoadIconW
SetWindowLongA
SetMenuItemInfoA
GetMenu
GetClientRect
DefWindowProcW
LoadCursorW
GetForegroundWindow
PostMessageA
CreateWindowExW
SetWindowTextW
SetWindowTextA
ReleaseDC
GetMenuItemCount
TranslateMessage
GetWindowTextW
MessageBeep
ole32
CoSetProxyBlanket
CoRegisterClassObject
CoTaskMemRealloc
CoRegisterChannelHook
advapi32
CheckTokenMembership
OpenThreadToken
QueryServiceStatus
GetSecurityDescriptorDacl
GetTokenInformation
RegDeleteKeyA
RegOpenKeyExA
IsValidSid
RegCreateKeyW
LookupAccountSidA
SetSecurityDescriptorDacl
RegCloseKey
shell32
SHBindToParent
msvcrt
__p__fmode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_except_handler3
__p__commode
__set_app_type
_controlfp
__dllonexit
_onexit
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 132KB - Virtual size: 226KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ